Chapter 2: Network Infrastructure and Documentation

Ace your homework & exams now with Quizwiz!

Entrance facility

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?

Look at whether the device is located on the ISP's side of the demarc.

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

• Use names that are as descriptive as possible (without giving away too much information to potential hackers)

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(1)

• Only include fields that are absolutely essential in identifying the device.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(2)

• Don't overcomplicate the name with useless or redundant information.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(3)

• Pay attention to any established naming convention already in use by your employer. For example, existing acronyms for the various departments in your corporation are more recognizable for employees.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(4)

• Think big-picture-down-to-details when designing device name fields, such as starting with the building name, then floor, then data room number, then rack number. If your company has national locations or international locations, certain names may need to include codes for continent, country, state, city, and so on. Think in terms of "top-down" or "outside-in" and be consistent.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(5)

• Consider any security risks from the details you might include in your naming convention. Make sure naming and labeling information is stored behind locked doors and inside secure databases. Don't use names that identify the location (physical or digital) of sensitive information that might alert an attacker to a highly desirable target, such as customer credit card information or protected patient data. When needed, use more obscure names that won't easily attract attention.

Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.(6)

Schedule the change for completion during off-hours (unless it is an emergency)

For what time period should you schedule a network change?

List contact info(Vendors, decision makers, team members, utilities (alarm, electric, water))

How can you go about gathering the information needed to assemble a thorough operations manual? (contacts)

List hardware(Devices, racks, jacks, patch panels, switches, ports, MDF/IDF, floor plans, power and water shutoff locations)

How can you go about gathering the information needed to assemble a thorough operations manual? (hardware)

List network configurations(Protocols, backups, passwords, IP addressing (static, DHCP scopes), subnets, VLANs, server roles, access methods, transmission details)

How can you go about gathering the information needed to assemble a thorough operations manual? (network configuration)

List any special instruction(Who to contact in an emergency, how to access backup information, how to meet the requirements of various privacy, security, and safety restrictions)

How can you go about gathering the information needed to assemble a thorough operations manual? (special instructions)

List software(Operating systems (and their configurations), applications (and their configuration), Active Directory (security groups, domains, etc.))

How can you go about gathering the information needed to assemble a thorough operations manual?(software)

Rack ears

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

By submitting a Change Request Document

In a large organization, how do you typically request permission to perform a network change?

hrtr01(home router 1),schadmrtr02(school administration building router 2), clpc01,clpc02(computer lab pc 1 and 2)

List some good names for devices on your home network or on the network in your school's lab.

MDF, IDF

There is only one -------- per network, but there can be many ------- connecting internal portions of the network.

Physical layout, logical topology, perimeter, access method, protocols, network devices and connections

What are some elements that are typically included in network diagrams?

List all components on the network.

What is the first step of inventory management?

Height,Width, Depth. Standard racks are 42U or about 6ft.

What is the unit of measurement that defines the space available in a rack? How tall are standard racks?

Network map

What type of diagram shows a graphical representation of a network's wired infrastructure?

VoIP gateway

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

a. Routers b. Switches d. KVM switch

Which of the following devices are you likely to find in the MDF? Choose all that apply. a. Routers b. Switches c. Network printer d. KVM switch

A password manager

Which of these is considered a secure place to store a list of documented network passwords?

Minimizing cable clutter can prevent airflow blockages and heat buildup

Why is it important to minimize cable clutter in a rack?

This method describes the best way to install networking media to maximize performance and minimize upkeep.

Why is it important to use a structured cabling standard when installing and managing cabling systems?

Plenum-rated cable is required by many local electrical-codes because it has a flame resistant jacket that produces less smoke then regular cable coated with PVC.

Why is it important to use plenum-rated cabling in the area above the ceiling tile?

Patch cable

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

a. Zenmap c. Command Prompt d.Powershell

You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply. a. Zenmap b. Microsoft Edge c. Command Prompt d. PowerShell


Related study sets

IL State Portion of Life Insurance Test

View Set

practice questions for final exam path 1

View Set

Chapter 15 - African Civilizations

View Set

EPS 601 Chapter 4 (Psychoanalytic Theory, study guide)

View Set

Business Law and Ethics: Chapter 10

View Set

MAP 1010 Medical Office Administration Chapter 20: Patient Collections and Financial Management

View Set